US10880298B2 - Method for generating a key and access control method - Google Patents
Method for generating a key and access control method Download PDFInfo
- Publication number
 - US10880298B2 US10880298B2 US15/668,551 US201715668551A US10880298B2 US 10880298 B2 US10880298 B2 US 10880298B2 US 201715668551 A US201715668551 A US 201715668551A US 10880298 B2 US10880298 B2 US 10880298B2
 - Authority
 - US
 - United States
 - Prior art keywords
 - client
 - terminal
 - server
 - cryptographic key
 - key
 - Prior art date
 - Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
 - Active
 
Links
Images
Classifications
- 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
 - H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING OR CALCULATING; COUNTING
 - G06F—ELECTRIC DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
 - G06F21/31—User authentication
 - G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
 - H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
 - H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
 - H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
 - H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
 - H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
 - H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
 - H04L9/3231—Biological data, e.g. fingerprint, voice or retina
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
 - H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
 - H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
 - H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
 - H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
 - H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
 - H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
 - H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
 - H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
 - H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
 - H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
 
 
Definitions
- the invention relates to the field of authentication of a client at a server, via biometric information, for access control of the client to a resource of the server.
 - the invention is notably directed to the protection of biometric reference data.
 - the invention also relates to the generation of a cryptographic key for said authentication for an access control.
 - the client to be identified is associated with a physical device, such as a mobile phone, a digital tablet, a personal computer. This will be more generally referred to as a client-terminal.
 - the client-terminal comprises means for acquiring biometric data (detector, camera, USB stick with a sensor, image sensor with an extraction module and a software solution, etc.).
 - biometric reference datum for example a fingerprint, an eye iris, etc. is not stored in plain text at the client, i.e. locally.
 - the biometric reference datum should not be either transmitted to the server for authentication. This latter condition imposes that the comparison of the acquired biometric datum and of the reference biometric datum is carried out locally.
 - the FAR (False Acceptance Rate) is the probability that an illegitimate user is falsely accepted as legitimate.
 - the FFR False Rejection Rate
 - a test biometric datum is acquired and is compared with the reference biometric datum. If both of these data are sufficiently close, a cryptographic key is unlocked, which allows authentication at the server. No biometric information is thereby transmitted to the server.
 - the reference biometric datum is masked in the client-terminal by means of a random value and/or of the cryptographic key. This is generally referred to as key-binding. Mention may be made of secure sketches algorithms for example.
 - a local biometric authentication is successful when it is followed by a conventional cryptographic authentication at a server.
 - the attacker does not access the details of the calculations which are executed in the client-terminal.
 - this terminal may be observed from a distance.
 - the attacks by acquiring data via a magnetic probe in proximity to the client-terminal, as described in the reference [PROBE] are not targeted.
 - the invention relates to a method for generating a cryptographic key for authenticating a client-terminal at a server in order to carry out an access control.
 - the method for generating a cryptographic key for applying an access control method to a resource of a server by a client-terminal comprises the following steps:
 - the generated cryptographic key is the legitimate cryptographic authentication key
 - the generated cryptographic key is an illegitimate cryptographic authentication key not allowing authentication of the client-terminal at the server during an access control
 - the method further comprises a preliminary step (E 0 ) for generating the test biometric datum, either by acquisition via biometric datum acquisition means, or by digital generation.
 - the encoding method is of the “secure sketch” type, such as a Fuzzy Commitment Scheme, or of the Helper Data System type, or of the Fuzzy Vault type for example with Reed-Solomon codes.
 - the step (E 2 ) for generating the cryptographic key comprises the application of an error decoding method.
 - the error decoding method is a soft decoding method, preferably with a limited number of iterations, for example by a limiting number or by a stopping quality criterion.
 - the legitimate cryptographic key has a format adapted for the use of the key in an access control protocol by authentication applied between the client-terminal and a server, and the decoding method is adapted so that the illegitimate cryptographic key has the format of the legitimate cryptographic key.
 - the method for decoding and the encoding method comprise honey encryption and decryption steps.
 - the encoding method is applied on a plurality of concatenated legitimate keys, the legitimate keys giving the possibility of authenticating the client-terminal at several respective servers and/or resources during an access control, and wherein the decoding method gives the possibility of obtaining a concatenated generated key comprising a plurality of generated keys concatenated with each other, the method advantageously comprising a step for selecting one of the generated keys from among the plurality of generated keys for its use in an access control method to the server and/or to a resource associated with the legitimate key which allowed generation of said generated key.
 - the matching between two biometric data means that the distance between both biometric data is less than a given threshold.
 - the invention also relates to an access control method of a client-terminal to a resource of a server, from the preceding key generation method.
 - the access control method of a client-terminal to a resource of a server comprises the following steps:
 - the alert method (F 5 ) comprises at least one of the following steps:
 - the method comprises the application of a protocol for zero-knowledge proof.
 - the exchanges between the client-terminal and the server comprise the application of an electronic signature, such as FIDO or ECDSA or further RSA.
 - the method applies commitment scheme according to Pedersen comprising an enrollment sentence wherein
 - the client-terminal stores a random quantity r
 - a 1 ⁇ A 2 g ⁇ 1 ⁇ h ⁇ 2
 - the server generates and sends a random value c to the client-terminal
 - K′ is the cryptographic key generated by the decoding method (E 2 , F 1 ) and a 1 and a 2 are random values
 - the transmission step (E 3 ) comprises the sending of y 1 and y 2 to the server
 - the embodiments may be combined, according to the technical feasibility.
 - the invention also relates to a calculation unit which may apply generation methods as described earlier or a portion of the access control methods described earlier.
 - Said calculation unit comprises a memory, a computer and a communication interface with a server.
 - the calculation unit may be a private device of an individual, of the mobile telephone type, of the digital tablet type or further of a personal computer type.
 - the invention also relates to computer program products comprising instructions for applying the earlier generation method and/or all or part of the preceding access control methods.
 - the computer program products therefore comprise instructions for the terminal and/or for the server.
 - FIG. 1 illustrates a system for authenticating a client-terminal at a server
 - FIG. 2 illustrates the general operation of the invention
 - FIG. 3 illustrates a particular embodiment of secure sketch, with a fuzzy commitment scheme
 - FIG. 4 illustrates different steps of an embodiment with Pedersen commitment scheme.
 - a system giving the possibility of authenticating a client represented as a client-terminal 10 is illustrated at a server 20 for controlling access to a resource of the server.
 - resource is meant data, applications or further services of the server 20 .
 - the client-terminal 10 belongs to a user called legitimate user.
 - the client-terminal 10 and the server 20 may communicate between them either directly, for example by a radiofrequency signal, or via a network 30 .
 - the client-terminal 10 appears as a performing mobile telephone such as a smartphone, or else a digital tablet, or further a computer.
 - the client-terminal 10 comprises a calculation unit 12 notably provided with a memory 14 and with a computer 16 .
 - the client-terminal 10 may either be used by a legitimate user to which it belongs, i.e. a non-fraudulent user, or else by an ill-intentioned user, i.e. a fraudulent user.
 - This fraudulent user may either be a person, or a digital entity.
 - the memory 14 may be in the form of a flash memory, or else of a read only memory, of the ROM type, or further a random access memory RAM.
 - the memory 14 may also be in the form of an external storage, configured for being physically connected to the calculation unit 12 , for example through a USB port.
 - the computer 16 is a microprocessor, a processor, or a microcontroller able to perform calculations and in particular to apply encoding or decoding algorithms, of the “key binding” type.
 - the computer 16 is notably configured for executing code lines from a computer program.
 - the client-terminal 10 comprises means for acquiring biometric data 18 .
 - These means 18 give the possibility of acquiring an iris or a fingerprint for example. Mention may be made for example of an image sensor coupled with a software module for extracting a biometric datum.
 - the acquisition means of biometric data 18 may be integrated to the client-terminal 10 or external data, but which may be connected to the latter.
 - acquisition devices are known which are connected by a wired connection to a computer.
 - the server 20 itself also comprises a calculation unit 22 notably provided with a memory 24 and a computer 26 .
 - the server 20 is typically a cloud server, i.e. delocalized.
 - the memory 24 may be in the form of a flash memory, or else a read only memory, of the ROM type, or further a random access memory RAM.
 - the memory 24 may also be in the form of an external storage, configured for being physically connected to the calculation unit 22 , for example through a USB port.
 - the computer 26 is a microprocessor, a processor, or a microcontroller able to perform calculations and in particular to apply authentication algorithms.
 - the computer 26 is notably configured for executing code lines from a computer program.
 - the two calculation units 12 , 22 advantageously comprise communication interfaces 11 , 21 at a distance for sending and receiving data, notably through the network 30 .
 - the network 30 is either an internet network, a wired network (Ethernet) or a wireless network (Wi-Fi), or a telephone network GPRS, EDGE, 3G or 4G or other, or a local network, or a radiofrequency signal network.
 - the communication interfaces 11 and 21 are adapted so as to allow communication depending on the relevant network 30 .
 - This method E is directed to generate a cryptographic key regardless of the input DBtest test biometric datum.
 - the authentication of the client-terminal 10 at the server 20 is accomplished by means of a legitimate cryptographic key Kl. If the server recognizes this key, the user is authenticated and the access to the resource of the server 20 is validated.
 - this DBref datum is not stored as such in the memory 14 of the client-terminal 10 .
 - the legitimate cryptographic key Kl is combined with the reference biometric datum DBref, for generating a reference datum Dref, stored in the memory 14 .
 - the GEN method is applied from Kl and BDref for obtaining at the output Dref.
 - This datum therefore gives the possibility of biometric authentication of the user at the server 20 .
 - the reference biometric datum DBref and the legitimate cryptographic key Kl may be destroyed so as not to be stored in clear text locally.
 - the encoding method GEN is a preliminary step G 0 for applying the method E for generating a cryptographic key which will be described below.
 - a test biometric datum DBtest is received by the calculation unit 12 of the client-terminal 10 .
 - this biometric datum BDtest is obtained either beforehand with the acquisition means 18 , or with a digital generation.
 - a second step E 2 the computer 16 applies a decoding method REP to the test biometric datum DBtest and the reference datum Rref, so that it generates a cryptographic key K′ regardless of the test biometric datum BDtest.
 - the decoding method REP is functionally related to the encoding method GEN. These methods may be of the “secure sketch” type like the “fuzzy commitment scheme”, or further of the “fuzzy vault” type, “helper data system” type, etc. The embodiment of the fuzzy commitment scheme will notably be described subsequently.
 - the matching between the biometric data may be accomplished in different ways. Notably methods for measuring the Hamming distance are notably known, or methods with a statistical distance or further measurements of similarity levels.
 - the illegitimate key Ki does not allow authentication of the client-terminal 10 at the server 20 .
 - the generated key K′ which is either legitimate or illegitimate, is used for applying a method for access control of the client-terminal 10 at the server 20 .
 - the use of the key K′ may simply consist of transmitting the key to the server 20 by means of the interface 11 , so that the latter applies a method for access control of the client-terminal 10 at a resource of the server 20 .
 - the use does not imply the direct transmission of the generated key K′, but implies operations for proof of knowledge, so that only one transmission of a datum associated with the key is carried out: it is thus possible to provide that the key K′ be transmitted in a masked way.
 - a distinct datum of K′ but generated from the latter is transmitted by the client-terminal 10 to the server 20 .
 - this will be referred to as data depending on the key. This for example is the case during Pedersen commitment scheme, which will be described subsequently. This type of method allows improved protection of the data.
 - a key K′ is systematically generated, so that the exchange of information between the client-terminal 10 and the server 20 are not accomplished exclusively if the legitimate key Kl is generated.
 - the server 20 may then be informed that a ill-intentioned user is trying to be authenticated fraudulently from the client-terminal 10 .
 - the fuzzy commitment scheme is used, i.e. a coding algorithm based on the use of an error corrector code.
 - the fuzzy commitment scheme is described in the document [FCS], (section I.A).
 - the encoding method GEN appears in the following form:
 - the word c is in fact a code word generated from the legitimate cryptographic key Kl (a code word is the re-writing of an original message wherein the redundancy has been added) and SSK is the reference datum DBref.
 - the decoding method REP appears in the following form:
 - FCS sufficiently close
 - an error decoding method in order to ensure that the decoding method REP systematically generates a key, even if b and b′ are not sufficiently close, an error decoding method, called soft decoding, is used. This method is itself also described in [FCS], section IV.
 - the soft decoding principle is to return, when this is possible, a code word c′ the most likely possible, and therefore with an error probability. If the method REP is successful in correcting all the errors, which is the case if both biometric data b and b′ correspond sufficiently together, the code word c′ will be the same as the code word c.
 - a maximum number of iterations may be set, for limiting the decoding time, or else a quality criterion may be defined (based on a threshold on the probability of error).
 - Another example of error decoding for making sure that the decoding method REP systematically generate a key would be to restrain the word found again to information bits (this may be accomplished by only selecting the first I bits of the word found again, if the corrector code is of dimension I), in order to consider them as an original message and encode it in a code word c′.
 - helper data system In another embodiment, an architecture of the helper data system type is used.
 - the helper data system is described in document [HDS], in section 3, and in FIG. 2 .
 - the encoding method GEN is then compliant with the protocol described in this publication giving the possibility of generating, from an initial biometric datum X (corresponding to DBref) and from a randomly generated secret S (corresponding to Kl), a doublet (W 1 , W 2 ).
 - the decoding REP may correspond to the decoding DEC described in this document, allowing regeneration of a secret S′ i (corresponding to K′) from a test biometric datum Y (corresponding to DBtest).
 - a soft decoding algorithm as described for the Fuzzy Commitment Scheme is applied.
 - an architecture of the fuzzy vault type is used.
 - the fuzzy vault is described in the document [FV].
 - the encoding method GEN corresponds to the LOCK algorithm described in section 3 of this article.
 - the decoding REP corresponds to the UNLOCK algorithm described in section 3 of this article, using a Reed Solomon decoding algorithm, to which is applied an iterative decoding method, as shown in document [FVDEC].
 - an algorithm of the fuzzy extractor type is used. This algorithm is described in document [FC], section 3.2.
 - the decoding may be applied with for example a method of the same type as FCS or Fuzzy Vault, depending on the underlying code to the algorithm.
 - the key should have a predetermined format.
 - the question is to ensure that the key K′ systematically generated at the output of the decoding step E 2 is compatible with this format.
 - the legitimate key Kl is selected in order to have this format, it is desired that the generated key K′ has this same format.
 - the method therefore comprises an additional step for converting the generated key K′ according to a desired format which corresponds to the format of the legitimate key, by means of a honey encryption algorithm.
 - This honey encryption algorithm uses the ciphering of the legitimate key Kl stored in parallel of BDref for finding again the key in the right format. This step is itself also applied by the computer 16 .
 - the encoding step of the legitimate key Kl therefore comprises the following steps: selection of the legitimate key Kl, encryption, called “honey encryption”, with the legitimate key Kl with another key Km a so called (“honey”) key in order to obtain an encrypted honey legitimate key Klm, and then applying the encoding method GEN with the honey encryption key Km.
 - the decoding step gives the possibility of obtaining a honey generated key K′m.
 - This honey generated key K′m is then used for decrypting the encrypted honey legitimate key Klm. Subsequently to this decryption, the generated key K′ is obtained which has the value Kl if the biometric data DBref and DBtest are sufficiently close.
 - a method for access control F may be applied.
 - a first step F 1 the method E for generating a cryptographic key as described earlier is applied.
 - the generated key K′ or data depending on this generated key K′ is sent to the server.
 - the sending may be simple, in plain text, or in a masked way, notably by means of proof of knowledge, wherein several data depending on the key are sent, but not the actual key. Mention may be made of the commitment scheme, as in the case of Pedersen (described subsequently).
 - a second step F 2 the cryptographic key K′, or else the data depending on this key, is received by the communication interface 21 of the server 20 .
 - a third step F 3 the key (or the data depending on the key) received in the preceding step is analyzed by the computer 26 of the server 20 .
 - the key K′ has been transmitted in clear text, or else has been transmitted in a masked way, notably by a proof of knowledge.
 - This analysis step F 3 gives the possibility of identifying whether the key K′ is the legitimate key Kl, in which case the user is authenticated, or else if the key K′ is an illegitimate key, in which case the user is not authenticated.
 - an alert method F 4 is triggered.
 - This alert method F 4 indicates that the test biometric datum DBtest does not correspond to the reference biometric datum BDref.
 - the server 20 from now on has the information that an illegitimate user is currently fraudulently using the client-terminal 10 .
 - the alert method F 4 may trigger different types of steps, which may be combined with each other and generated by the server 20 .
 - the server 20 sends to the client-terminal 10 a set value for reacquiring the test biometric datum BDtest.
 - a counting variable is incremented by iteration at each reception of an illegitimate key Ki, so that the server 20 is aware of the number of authentication attempts.
 - the server 20 sends a set value for locking the client terminal 10 with the client-terminal 10 , in order to prevent any connection attempt.
 - the sending of this set value may be accomplished after the counting variable has attained a certain value, for example 5.
 - the server 20 may trigger a biased authentication of the client terminal 10 at the server 20 , so that the client-terminal 10 behaves like an authenticated terminal. The fraudulent user then does not know that the authentication has been a failure. The server 20 may then monitor the acts of the client-terminal 10 , or give him/her access to false data for example.
 - the server 20 destroys confidential data which it stores in its memory 22 , such as for example data relative to one or several legitimate users of the client-terminal.
 - the server 20 generates a set value for destroying data relative to the legitimate user stored in the memory 12 of the client-terminal 10 .
 - the encoding GEN and the decoding REP are carried out with several keys at a time.
 - the key generation method then includes a step for selecting the “right” key depending on the associated server.
 - a plurality of servers and/or of resources associated with the server(s) is thus defined, and with each server and/or respective resources is associated a legitimate key for access control.
 - the code word c is obtained as the code word derived from Kl 1 ⁇ Kl 2 ⁇ . . . ⁇ Kl n (where ⁇ corresponds to the concatenation operator).
 - Kl 1 will be used for a first server and/or resource
 - Kl 2 for the second server and/or resource, etc . . .
 - a selection step is applied for recovering the desired generated key.
 - the selected «right» key is then used within the scope of an access control with the corresponding server (step E 3 ).
 - This embodiment gives the possibility to the client-terminal of exchanging with several servers and/or resources of a server while keeping a common encryption procedure.
 - This embodiment is compatible with others with honeyed encryption, which is then applied on Kl 1 ⁇ Kl 2 ⁇ . . . KL n .
 - the Pedersen commitment scheme comprises two phases: a commitment phase and a revealing phase.
 - the enrollment phrase is applied before the method E for generating a cryptographic key.
 - This commitment MG is then sent to the server 20 which stores it in its memory 22 .
 - the revealing phase is accomplished if an authentication method F is triggered.
 - step E 3 Prior to step E 3 , F 2 for transmission of the generated cryptographic key K′, which is here masked by means of the value r, the client-terminal 10 and the server 20 exchange different data (cf. the data depending on the key, mentioned earlier).
 - a sub-step G 11 the client-terminal 10 calculates and sends to the server 20 :
 - a 1 ⁇ A 2 g ⁇ 1 ⁇ h ⁇ 2
 - a 1 and a 2 are noted as y and s in [CERIAS] and are random values.
 - the server 20 In a sub-step G 12 , the server 20 generates and sends a random value c to the client-terminal 10 (also noted as c in [CERIAS]).
 - the client-terminal 10 calculates by means of the cryptographic key K′ generated by the decoding method E 2 .
 - the client terminal 10 sends y 1 and y 2 to the server 20 .
 - the authentication may comprise a protocol with no zero-knowledge proof, illustrated by the Pedersen commitment.
 - a complementary embodiment for exchanges between the server and the client terminal uses an electronic signature, such as in FIDO, or else by using ECDSA or RSA.
 
Landscapes
- Engineering & Computer Science (AREA)
 - Computer Security & Cryptography (AREA)
 - Signal Processing (AREA)
 - Computer Networks & Wireless Communication (AREA)
 - Computer Hardware Design (AREA)
 - General Engineering & Computer Science (AREA)
 - Theoretical Computer Science (AREA)
 - Health & Medical Sciences (AREA)
 - General Health & Medical Sciences (AREA)
 - Biomedical Technology (AREA)
 - Computing Systems (AREA)
 - Software Systems (AREA)
 - Physics & Mathematics (AREA)
 - General Physics & Mathematics (AREA)
 - Life Sciences & Earth Sciences (AREA)
 - Biodiversity & Conservation Biology (AREA)
 - Storage Device Security (AREA)
 
Abstract
- (E1) receiving a test biometric datum (DBtest),
 - (E2) applying a decoding method to the test biometric datum (DBtest) and of a reference datum (Dref) for obtaining a cryptographic key (K′) such that:
    
- if the test biometric datum (DBtest) corresponds to the reference biometric datum (DBref), the cryptographic key generated (K′) is the legitimate cryptographic authentication key (Kl),
 - otherwise, the generated cryptographic key (K′) is an illegitimate cryptographic authentication key (Ki) not allowing authentication of the client-terminal (10) at the server (20) during an access control, and
 
 - (E3) using the generated key for applying an access control method (F3) to a resource of the server (20) by the client-terminal (10).
 
Description
- storing the number of iterations of receptions of illegitimate keys, and/or
 - sending a set value for locking the client-terminal, and/or
 - biased authentication of the client-terminal at the server, so as to be able to monitor said client-terminal, and/or
 - destruction of the data stored on the client-terminal and/or on the server, and/or,
 - sending to the client-terminal a set value for re-acquiring test biometric data.
 
A 1 ·A 2 =g α
y 1=α1 +K′·c et y 2=α2 +r·c
wherein K′ is the cryptographic key generated by the decoding method (E2, F1) and a1 and a2 are random values,
g y
- binarize the test biometric datum DBtest, in order to obtain b′,
 - calculate c XOR b XOR b′ from the datum SSK, in order to obtain c′.
 
MG(r,Kl)=c(r,Kl)=g Kl h r
wherein g and h are such that logg(h) is not known. Kl and r correspond to s and t in part 3 of [CP], and to x and r in [CERIAS].
A 1 ·A 2 =g α
Wherein a1 and a2 are noted as y and s in [CERIAS] and are random values.
y 1=α1 +K′·c et y 2=α2 +r·c
g y
This equality is verified if K′=Kl.
- [CRYBIO]: “Biometric Encryption Chapter from the Encyclopedia of Biometrics”, of Cavoukian and Stoianov.
 - [WEAK]: “Privacy Weaknesses in Biometric Sketches” of Simoens, Tuyls and Preneel.
 - [PROBE]: “ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels” of Genkin et al.
 - [FCS]: “Theoretical and Practical. Boundaries of Binary Secure Sketches”, of Bringer et al.
 - [HDS]: “Practical Biometric Authentication with Template Protection”, of Tuyls et al.
 - [FV]: “A Fuzzy Vault Scheme” of Juels et al.
 - [FVDEC]: “Algebraic soft-decision decoding of Reed-Solomon codes” of Koetter et al.
 - [FC]: “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data”, of Dodis et al.
 - [HE]: “Honey Encryption: Security Beyond the Brute-Force Bound” of Juels et al.
 - [CP]: “Non-interactive and information-theoretical secure verifiable secret sharing”, of Pedersen.
 - [CERIAS]: CERIAS Tech Report 2008-28 Privacy-Preserving Management of Transactions' Receipts by Federica Paci, Ning Shang, Elisa Bertino, Sam Kerr, Kevin Steuer, Jr., Jungha Woo Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, Ind. 47907-2086.
 - [SCH]: Schnorr; “Efficient identification and signatures for smart cards”. In CRYPTO ‘89”
 
Claims (17)
A 1 ·A 2 =g α
y 1=α1 +K′·c et y 2=α2 +r·c
g y
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title | 
|---|---|---|---|
| FR1657573A FR3054905B1 (en) | 2016-08-04 | 2016-08-04 | KEY GENERATION METHOD AND ACCESS CONTROL METHOD | 
| FR1657573 | 2016-08-04 | 
Publications (2)
| Publication Number | Publication Date | 
|---|---|
| US20180041505A1 US20180041505A1 (en) | 2018-02-08 | 
| US10880298B2 true US10880298B2 (en) | 2020-12-29 | 
Family
ID=57590590
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date | 
|---|---|---|---|
| US15/668,551 Active US10880298B2 (en) | 2016-08-04 | 2017-08-03 | Method for generating a key and access control method | 
Country Status (3)
| Country | Link | 
|---|---|
| US (1) | US10880298B2 (en) | 
| EP (1) | EP3280089B1 (en) | 
| FR (1) | FR3054905B1 (en) | 
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US20200036708A1 (en) * | 2018-06-15 | 2020-01-30 | Proxy, Inc. | Biometric credential improvement methods and apparatus | 
| US11462095B2 (en) | 2018-06-15 | 2022-10-04 | Proxy, Inc. | Facility control methods and apparatus | 
| US11509475B2 (en) | 2018-06-15 | 2022-11-22 | Proxy, Inc. | Method and apparatus for obtaining multiple user credentials | 
| US11546728B2 (en) | 2018-06-15 | 2023-01-03 | Proxy, Inc. | Methods and apparatus for presence sensing reporting | 
| US11902791B2 (en) | 2018-06-15 | 2024-02-13 | Oura Health Oy | Reader device with sensor streaming data and methods | 
| US12327451B2 (en) | 2022-08-09 | 2025-06-10 | VaultRight, LLC | System to enhance security of access and electronic key and combination distribution | 
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| CN111654365B (en) * | 2019-03-04 | 2021-04-30 | 北京大学 | Conditional distribution conversion coding method and encryption method | 
| FR3095539B1 (en) | 2019-04-29 | 2021-04-09 | Idemia Identity & Security France | PROCESS FOR CONDUCTING A TRANSACTION | 
| GB2584154A (en) * | 2019-05-24 | 2020-11-25 | Nchain Holdings Ltd | Knowledge proof | 
| GB201907396D0 (en) | 2019-05-24 | 2019-07-10 | Nchain Holdings Ltd | Hash function attacks | 
| GB201907392D0 (en) | 2019-05-24 | 2019-07-10 | Nchain Holdings Ltd | Proof-of-work | 
| EP4035035A4 (en) * | 2019-09-25 | 2023-10-04 | Commonwealth Scientific and Industrial Research Organisation | CRYPTOGRAPHIC SERVICES FOR BROWSER APPLICATIONS | 
| KR102658914B1 (en) * | 2019-10-02 | 2024-04-18 | 삼성에스디에스 주식회사 | Method and apparatus for user authentication | 
| FR3116626B1 (en) * | 2020-11-25 | 2024-05-03 | Idakto | method and device for generating authentication information associated with an individual and associated identity control device method | 
| CN114501431A (en) * | 2021-12-16 | 2022-05-13 | 珠海格力电器股份有限公司 | Message transmission method, device, storage medium and electronic device | 
Citations (35)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US6038315A (en) * | 1997-03-17 | 2000-03-14 | The Regents Of The University Of California | Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy | 
| US20030174840A1 (en) * | 2002-03-12 | 2003-09-18 | Bogan William B. | Encryption method for preventing unauthorized dissemination of protected data | 
| US20040139315A1 (en) * | 2002-10-09 | 2004-07-15 | Fujitsu Limited | Private data protection distribution method and program | 
| US6986046B1 (en) * | 2000-05-12 | 2006-01-10 | Groove Networks, Incorporated | Method and apparatus for managing secure collaborative transactions | 
| US20060123241A1 (en) * | 2004-12-07 | 2006-06-08 | Emin Martinian | Biometric based user authentication and data encryption | 
| US20060123239A1 (en) * | 2004-12-07 | 2006-06-08 | Emin Martinian | Biometric based user authentication with syndrome codes | 
| US20070180261A1 (en) * | 2004-06-09 | 2007-08-02 | Koninklijke Philips Electronics, N.V. | Biometric template protection and feature handling | 
| US20070253608A1 (en) * | 2006-03-03 | 2007-11-01 | The Research Foundation Of State University Of New York Stor Intellectual Property Division | Secure fingerprint matching by hashing localized information | 
| US20080072063A1 (en) * | 2006-09-06 | 2008-03-20 | Kenta Takahashi | Method for generating an encryption key using biometrics authentication and restoring the encryption key and personal authentication system | 
| US20080172725A1 (en) * | 2007-01-16 | 2008-07-17 | Yoshihiro Fujii | System, apparatus, and program for biometric authentication | 
| US7526653B1 (en) * | 1999-08-25 | 2009-04-28 | Giesecke & Devrient Gmbh | Method of data protection | 
| US20090147958A1 (en) * | 2007-12-08 | 2009-06-11 | International Business Machines Corporation | Dynamic, Selective Obfuscation of Information for Multi-Party Transmission | 
| US20110191837A1 (en) * | 2008-09-26 | 2011-08-04 | Koninklijke Philips Electronics N.V. | Authenticating a device and a user | 
| US20120131350A1 (en) * | 2009-05-18 | 2012-05-24 | Mikoh Corporation | Biometric identification method | 
| US20130326220A1 (en) * | 2012-05-31 | 2013-12-05 | Apple Inc. | Recipient blind cryptographic access control for publicly hosted message and data streams | 
| US20150095654A1 (en) * | 2013-09-30 | 2015-04-02 | Jiangtao Li | Cryptographic key generation based on multiple biometrics | 
| US9037858B1 (en) * | 2013-03-12 | 2015-05-19 | Emc Corporation | Distributed cryptography using distinct value sets each comprising at least one obscured secret value | 
| US20150341350A1 (en) * | 2014-05-23 | 2015-11-26 | Fujitsu Limited | Privacy preserving biometric authentication based on error correcting codes | 
| US20160112415A1 (en) * | 2014-10-15 | 2016-04-21 | Samsung Electronics Co., Ltd. | Method of providing information security and electronic device thereof | 
| US9325499B1 (en) * | 2013-06-24 | 2016-04-26 | Emc Corporation | Message encryption and decryption utilizing low-entropy keys | 
| US20160164682A1 (en) | 2014-12-04 | 2016-06-09 | Fujitsu Limited | Privacy preserving set-based biometric authentication | 
| US20160373417A1 (en) * | 2015-06-20 | 2016-12-22 | Fujitsu Limited | Biometric based authenticated key exchange | 
| US20170076145A1 (en) * | 2015-09-11 | 2017-03-16 | EyeVerify Inc. | Image enhancement and feature extraction for ocular-vascular and facial recognition | 
| US9621533B2 (en) * | 2012-12-14 | 2017-04-11 | Nec Corporation | Bit string collation system, bit string collation method, and program | 
| US9699173B1 (en) * | 2015-05-22 | 2017-07-04 | Amazon Technologies, Inc. | Incorrect password management | 
| US20170193628A1 (en) * | 2015-07-16 | 2017-07-06 | Digimarc Corporation | Signal Processors and Methods for Estimating Geometric Transformations of Images for Digital Data Extraction | 
| US20170373858A1 (en) * | 2016-06-24 | 2017-12-28 | Fujitsu Limited | Cryptographic primitive for user authentication | 
| US20180316653A1 (en) * | 2017-04-26 | 2018-11-01 | At&T Intellectual Property I, L.P. | Privacy-Preserving Location Corroborations | 
| US20190036699A1 (en) * | 2015-10-09 | 2019-01-31 | Intel Corporation | Technologies for end-to-end biometric-based authentication and platform locality assertion | 
| US10248771B1 (en) * | 2014-01-24 | 2019-04-02 | Microstrategy Incorporated | Performing biometrics operations in uncontrolled environments | 
| US20190238344A1 (en) * | 2016-07-21 | 2019-08-01 | Hitachi, Ltd. | Signature verification system, signature verification method, and storage medium | 
| US10454677B1 (en) * | 2016-02-24 | 2019-10-22 | United Services Automobile Associate (USAA) | Cryptographic key generation from biometric data | 
| US20190327092A1 (en) * | 2018-04-23 | 2019-10-24 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Methods and systems for secure biometric authentication | 
| US10594688B2 (en) * | 2015-03-09 | 2020-03-17 | Cross Match Technologies, Inc. | Privacy-enhanced biometrics-secret binding scheme | 
| US10621584B2 (en) * | 2016-03-16 | 2020-04-14 | Clover Network, Inc. | Network of biometrically secure devices with enhanced privacy protection | 
- 
        2016
        
- 2016-08-04 FR FR1657573A patent/FR3054905B1/en active Active
 
 - 
        2017
        
- 2017-08-03 US US15/668,551 patent/US10880298B2/en active Active
 - 2017-08-04 EP EP17184957.3A patent/EP3280089B1/en active Active
 
 
Patent Citations (36)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US6038315A (en) * | 1997-03-17 | 2000-03-14 | The Regents Of The University Of California | Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy | 
| US7526653B1 (en) * | 1999-08-25 | 2009-04-28 | Giesecke & Devrient Gmbh | Method of data protection | 
| US6986046B1 (en) * | 2000-05-12 | 2006-01-10 | Groove Networks, Incorporated | Method and apparatus for managing secure collaborative transactions | 
| US20030174840A1 (en) * | 2002-03-12 | 2003-09-18 | Bogan William B. | Encryption method for preventing unauthorized dissemination of protected data | 
| US20040139315A1 (en) * | 2002-10-09 | 2004-07-15 | Fujitsu Limited | Private data protection distribution method and program | 
| US20070180261A1 (en) * | 2004-06-09 | 2007-08-02 | Koninklijke Philips Electronics, N.V. | Biometric template protection and feature handling | 
| US20060123239A1 (en) * | 2004-12-07 | 2006-06-08 | Emin Martinian | Biometric based user authentication with syndrome codes | 
| US20060123241A1 (en) * | 2004-12-07 | 2006-06-08 | Emin Martinian | Biometric based user authentication and data encryption | 
| US20070253608A1 (en) * | 2006-03-03 | 2007-11-01 | The Research Foundation Of State University Of New York Stor Intellectual Property Division | Secure fingerprint matching by hashing localized information | 
| US20080072063A1 (en) * | 2006-09-06 | 2008-03-20 | Kenta Takahashi | Method for generating an encryption key using biometrics authentication and restoring the encryption key and personal authentication system | 
| US20080172725A1 (en) * | 2007-01-16 | 2008-07-17 | Yoshihiro Fujii | System, apparatus, and program for biometric authentication | 
| US20090147958A1 (en) * | 2007-12-08 | 2009-06-11 | International Business Machines Corporation | Dynamic, Selective Obfuscation of Information for Multi-Party Transmission | 
| US20110191837A1 (en) * | 2008-09-26 | 2011-08-04 | Koninklijke Philips Electronics N.V. | Authenticating a device and a user | 
| US20120131350A1 (en) * | 2009-05-18 | 2012-05-24 | Mikoh Corporation | Biometric identification method | 
| US20130326220A1 (en) * | 2012-05-31 | 2013-12-05 | Apple Inc. | Recipient blind cryptographic access control for publicly hosted message and data streams | 
| US9621533B2 (en) * | 2012-12-14 | 2017-04-11 | Nec Corporation | Bit string collation system, bit string collation method, and program | 
| US9037858B1 (en) * | 2013-03-12 | 2015-05-19 | Emc Corporation | Distributed cryptography using distinct value sets each comprising at least one obscured secret value | 
| US9325499B1 (en) * | 2013-06-24 | 2016-04-26 | Emc Corporation | Message encryption and decryption utilizing low-entropy keys | 
| US20150095654A1 (en) * | 2013-09-30 | 2015-04-02 | Jiangtao Li | Cryptographic key generation based on multiple biometrics | 
| US10248771B1 (en) * | 2014-01-24 | 2019-04-02 | Microstrategy Incorporated | Performing biometrics operations in uncontrolled environments | 
| US20150341350A1 (en) * | 2014-05-23 | 2015-11-26 | Fujitsu Limited | Privacy preserving biometric authentication based on error correcting codes | 
| US20160112415A1 (en) * | 2014-10-15 | 2016-04-21 | Samsung Electronics Co., Ltd. | Method of providing information security and electronic device thereof | 
| US20160164682A1 (en) | 2014-12-04 | 2016-06-09 | Fujitsu Limited | Privacy preserving set-based biometric authentication | 
| US10594688B2 (en) * | 2015-03-09 | 2020-03-17 | Cross Match Technologies, Inc. | Privacy-enhanced biometrics-secret binding scheme | 
| US9699173B1 (en) * | 2015-05-22 | 2017-07-04 | Amazon Technologies, Inc. | Incorrect password management | 
| US20160373417A1 (en) * | 2015-06-20 | 2016-12-22 | Fujitsu Limited | Biometric based authenticated key exchange | 
| US20170193628A1 (en) * | 2015-07-16 | 2017-07-06 | Digimarc Corporation | Signal Processors and Methods for Estimating Geometric Transformations of Images for Digital Data Extraction | 
| US20170076145A1 (en) * | 2015-09-11 | 2017-03-16 | EyeVerify Inc. | Image enhancement and feature extraction for ocular-vascular and facial recognition | 
| US20190036699A1 (en) * | 2015-10-09 | 2019-01-31 | Intel Corporation | Technologies for end-to-end biometric-based authentication and platform locality assertion | 
| US10454677B1 (en) * | 2016-02-24 | 2019-10-22 | United Services Automobile Associate (USAA) | Cryptographic key generation from biometric data | 
| US10621584B2 (en) * | 2016-03-16 | 2020-04-14 | Clover Network, Inc. | Network of biometrically secure devices with enhanced privacy protection | 
| US20170373858A1 (en) * | 2016-06-24 | 2017-12-28 | Fujitsu Limited | Cryptographic primitive for user authentication | 
| US10608823B2 (en) * | 2016-06-24 | 2020-03-31 | Fujitsu Limited | Cryptographic primitive for user authentication | 
| US20190238344A1 (en) * | 2016-07-21 | 2019-08-01 | Hitachi, Ltd. | Signature verification system, signature verification method, and storage medium | 
| US20180316653A1 (en) * | 2017-04-26 | 2018-11-01 | At&T Intellectual Property I, L.P. | Privacy-Preserving Location Corroborations | 
| US20190327092A1 (en) * | 2018-04-23 | 2019-10-24 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Methods and systems for secure biometric authentication | 
Non-Patent Citations (4)
| Title | 
|---|
| Juels et al.; A Fuzzy Commitment Scheme; 1999; Retrieved from the Internet <URL: https://dl.acm.org/citation.cfm?id=319714>; pp. 1-9, as printed. (Year: 1999). * | 
| Kikuchi et al.; Privacy-preserving similarity evaluation and application to remote biometrics authentication; 2009; Retrieved from the Internet <URL: https://link.springer.com/article/10.1007/s00500-009-0449-6>; pp. 1-8, as printed. (Year: 2009). * | 
| Pedersen; Non-Interactive and Information-Theoretic Secure Verifiale Secret Sharing; 1992; Retrieved from the Internet https://jim.com/security/pedersons_secret_sharing.pdf; pp. 1-12, as printed. (Year: 1992). * | 
| Search Report and Written Opinion in French Application No. 1657573 dated Apr. 18, 2017, with English translation coversheet. | 
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US20200036708A1 (en) * | 2018-06-15 | 2020-01-30 | Proxy, Inc. | Biometric credential improvement methods and apparatus | 
| US11462095B2 (en) | 2018-06-15 | 2022-10-04 | Proxy, Inc. | Facility control methods and apparatus | 
| US11509475B2 (en) | 2018-06-15 | 2022-11-22 | Proxy, Inc. | Method and apparatus for obtaining multiple user credentials | 
| US11539522B2 (en) | 2018-06-15 | 2022-12-27 | Proxy, Inc. | Methods and apparatus for authorizing and providing of services | 
| US11546728B2 (en) | 2018-06-15 | 2023-01-03 | Proxy, Inc. | Methods and apparatus for presence sensing reporting | 
| US11902791B2 (en) | 2018-06-15 | 2024-02-13 | Oura Health Oy | Reader device with sensor streaming data and methods | 
| US12327451B2 (en) | 2022-08-09 | 2025-06-10 | VaultRight, LLC | System to enhance security of access and electronic key and combination distribution | 
Also Published As
| Publication number | Publication date | 
|---|---|
| EP3280089A1 (en) | 2018-02-07 | 
| FR3054905B1 (en) | 2019-10-18 | 
| US20180041505A1 (en) | 2018-02-08 | 
| EP3280089B1 (en) | 2022-03-09 | 
| FR3054905A1 (en) | 2018-02-09 | 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| US10880298B2 (en) | Method for generating a key and access control method | |
| Xi et al. | A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment | |
| US10680808B2 (en) | 1:N biometric authentication, encryption, signature system | |
| EP1815637B1 (en) | Securely computing a similarity measure | |
| US8838990B2 (en) | Bio-cryptography: secure cryptographic protocols with bipartite biotokens | |
| JP7302606B2 (en) | system and server | |
| JP2008502071A (en) | Biometric template protection and characterization | |
| CN100566250C (en) | A kind of point to point network identity identifying method | |
| EP3224983B1 (en) | A method and device for authentication | |
| JP2008538146A (en) | Architecture for privacy protection of biometric templates | |
| JP7231023B2 (en) | Verification system, client and server | |
| Pahlevi et al. | Secure two-factor authentication for iot device | |
| US8806216B2 (en) | Implementation process for the use of cryptographic data of a user stored in a data base | |
| Albahbooh et al. | A mobile phone device as a biometrics authentication method for an ATM terminal | |
| Om et al. | A password authentication method for remote users based on smart card and biometrics | |
| Mitchell et al. | Security of the Lin-Lai smart card based user authentication scheme | |
| KR100986980B1 (en) | Biometric Authentication Methods, Clients, and Servers | |
| Nandakumar | BioSAKE: Biometrics-based secure authentication and key exchange | |
| Liu et al. | On the security of Yoon and Yoo’s biometrics remote user authentication scheme | |
| Turakulovich et al. | Comparative factors of key generation techniques | |
| Hartung et al. | Biometric transaction authentication protocol | |
| CN108243156B (en) | Method and system for network authentication based on fingerprint key | |
| Hartloff et al. | A multiple server scheme for fingerprint fuzzy vaults | |
| WO2025172235A1 (en) | Method for secure authentication and audit data generation | |
| WO2023181163A1 (en) | Collation system, collation device, collation method, and program | 
Legal Events
| Date | Code | Title | Description | 
|---|---|---|---|
| AS | Assignment | 
             Owner name: IDEMIA IDENTITY & SECURITY, FRANCE Free format text: CHANGE OF NAME;ASSIGNOR:SAFRAN IDENTITY & SECURITY;REEL/FRAME:047529/0948 Effective date: 20171002  | 
        |
| STPP | Information on status: patent application and granting procedure in general | 
             Free format text: NON FINAL ACTION MAILED  | 
        |
| AS | Assignment | 
             Owner name: SAFRAN IDENTITY & SECURITY, FRANCE Free format text: CHANGE OF NAME;ASSIGNOR:MORPHO;REEL/FRAME:048039/0605 Effective date: 20160613  | 
        |
| AS | Assignment | 
             Owner name: SAFRAN IDENTITY & SECURITY, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FONDEUR, JEAN-CHRISTOPHE;CHABANNE, HERVE;BRINGER, JULIEN;SIGNING DATES FROM 20180222 TO 20180322;REEL/FRAME:048271/0314  | 
        |
| STPP | Information on status: patent application and granting procedure in general | 
             Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER  | 
        |
| STPP | Information on status: patent application and granting procedure in general | 
             Free format text: FINAL REJECTION MAILED  | 
        |
| STPP | Information on status: patent application and granting procedure in general | 
             Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER  | 
        |
| STPP | Information on status: patent application and granting procedure in general | 
             Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION  | 
        |
| STPP | Information on status: patent application and granting procedure in general | 
             Free format text: NON FINAL ACTION MAILED  | 
        |
| AS | Assignment | 
             Owner name: IDEMIA IDENTITY & SECURITY FRANCE, FRANCE Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE CORRECT THE ASSIGNEE NAME PREVIOUSLY RECORDED AT REEL: 047529 FRAME: 0949. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:SAFRAN IDENTITY & SECURITY;REEL/FRAME:052551/0082 Effective date: 20171002  | 
        |
| STPP | Information on status: patent application and granting procedure in general | 
             Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER  | 
        |
| AS | Assignment | 
             Owner name: IDEMIA IDENTITY & SECURITY FRANCE, FRANCE Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE THE RECEIVING PARTY DATA PREVIOUSLY RECORDED ON REEL 047529 FRAME 0948. ASSIGNOR(S) HEREBY CONFIRMS THE CHANGE OF NAME;ASSIGNOR:SAFRAN IDENTITY AND SECURITY;REEL/FRAME:055108/0009 Effective date: 20171002  | 
        |
| STPP | Information on status: patent application and granting procedure in general | 
             Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED  | 
        |
| STCF | Information on status: patent grant | 
             Free format text: PATENTED CASE  | 
        |
| AS | Assignment | 
             Owner name: IDEMIA IDENTITY & SECURITY FRANCE, FRANCE Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE APPLICATION NUMBER PREVIOUSLY RECORDED AT REEL: 055108 FRAME: 0009. ASSIGNOR(S) HEREBY CONFIRMS THE CHANGE OF NAME;ASSIGNOR:SAFRAN IDENTITY AND SECURITY;REEL/FRAME:055314/0930 Effective date: 20171002  | 
        |
| AS | Assignment | 
             Owner name: IDEMIA IDENTITY & SECURITY FRANCE, FRANCE Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE THE REMOVE PROPERTY NUMBER 15001534 PREVIOUSLY RECORDED AT REEL: 055314 FRAME: 0930. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:SAFRAN IDENTITY & SECURITY;REEL/FRAME:066629/0638 Effective date: 20171002 Owner name: IDEMIA IDENTITY & SECURITY, FRANCE Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ERRONEOUSLY NAMED PROPERTIES 14/366,087 AND 15/001,534 PREVIOUSLY RECORDED ON REEL 047529 FRAME 0948. ASSIGNOR(S) HEREBY CONFIRMS THE CHANGE OF NAME;ASSIGNOR:SAFRAN IDENTITY & SECURITY;REEL/FRAME:066343/0232 Effective date: 20171002 Owner name: SAFRAN IDENTITY & SECURITY, FRANCE Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ERRONEOUSLY NAMED PROPERTIES 14/366,087 AND 15/001,534 PREVIOUSLY RECORDED ON REEL 048039 FRAME 0605. ASSIGNOR(S) HEREBY CONFIRMS THE CHANGE OF NAME;ASSIGNOR:MORPHO;REEL/FRAME:066343/0143 Effective date: 20160613 Owner name: IDEMIA IDENTITY & SECURITY FRANCE, FRANCE Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE ERRONEOUSLY NAME PROPERTIES/APPLICATION NUMBERS PREVIOUSLY RECORDED AT REEL: 055108 FRAME: 0009. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:SAFRAN IDENTITY & SECURITY;REEL/FRAME:066365/0151 Effective date: 20171002  | 
        |
| MAFP | Maintenance fee payment | 
             Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4  | 
        |
| AS | Assignment | 
             Owner name: IDEMIA IDENTITY & SECURITY FRANCE, FRANCE Free format text: CHANGE OF NAME;ASSIGNOR:SAFRAN IDENTITY & SECURITY;REEL/FRAME:068119/0270 Effective date: 20160614  | 
        |
| AS | Assignment | 
             Owner name: IDEMIA PUBLIC SECURITY FRANCE, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:IDEMIA IDENTITY & SECURITY FRANCE;REEL/FRAME:071930/0625 Effective date: 20241231  |